The SHA-2 family of hash functions lies at the core of securing the internet today. A recent paper by Yingxin Li, Fukang Liu, and Gaoli Wang presents new records in collision attacks for SHA-2. For the brave, the paper can be found at: https://eprint...
securingbits.com1 min read
No responses yet.